Patents by Inventor Philip Hawkes

Philip Hawkes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070274526
    Abstract: Disclosed is a method for securely presenting content in a mobile station. The mobile station may have a smart module, a security agent, and an air interface for communicating with a content provider and with a remote content rights manager. The smart module stores content presentation units and has a proxy content rights manager for when the mobile station is unable to receive secure content keys from the remote content rights manager using the air interface. In the method, content presentation units are transferred from the remote rights manager to the smart module for storage. Secure content keys are requested from the smart module for allowing presentation of content requested while the mobile station is unable to communicate with the remote rights manager. The secure content keys are transferred, based on a stored content presentation unit, from the proxy content rights manager to the security agent for allowing content presentation.
    Type: Application
    Filed: January 31, 2007
    Publication date: November 29, 2007
    Applicant: QUALCOMM INCORPORATED
    Inventors: Jun Wang, Charles Lo, Lakshminath Dondeti, Philip Hawkes
  • Publication number: 20070174613
    Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.
    Type: Application
    Filed: February 10, 2006
    Publication date: July 26, 2007
    Inventors: Michael Paddon, Gregory Rose, James Semple, Philip Hawkes
  • Publication number: 20070116282
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
    Type: Application
    Filed: January 24, 2007
    Publication date: May 24, 2007
    Applicant: QUALCOMM, INC.
    Inventors: Philip Hawkes, Raymond Hsu, Ramin Rezaiifar, Gregory Rose, Paul Bender, Jun Wang, Roy Quick, Arungundram Mahendran, Parag Agashe
  • Publication number: 20060253900
    Abstract: Embodiments describe techniques in connection with configuring a firewall and/or reducing network traffic. According to an embodiment is a method for configuring a firewall to reduce unwanted network traffic. The method includes executing a web-server and detecting a passive socket has been created. The method also includes establishing contact with a firewall and requesting the firewall to permit flows directed to the passive socket. According to some embodiments, the method can include closing the web-server and destroying the passive socket. The firewall can be contacted with the destroyed passive socket information and can be sent a request to deny flows directed to the destroyed passive socket. If the passive socket is closed, the method can automatically revoke the request to the firewall to permit flows directed to the passive socket.
    Type: Application
    Filed: December 21, 2005
    Publication date: November 9, 2006
    Inventors: Michael Paddon, Philip Hawkes, Gregory Rose
  • Publication number: 20060120531
    Abstract: A communications system and method of bootstrapping mobile station authentication and establishing a secure encryption key are disclosed. In one embodiment of the communications network, a distinguished random challenge is reserved for generation of a secure encryption key, wherein the distinguished random challenge is not used for authentication of a mobile station. The distinguished random challenge is stored at a mobile station's mobile equipment and used to generate a secure encryption key, and a bootstrapping function in the network uses a normal random challenge to authenticate the mobile station and the distinguished random challenge to generate the secure encryption key.
    Type: Application
    Filed: September 2, 2005
    Publication date: June 8, 2006
    Inventors: James Semple, Gregory Rose, Michael Paddon, Philip Hawkes
  • Publication number: 20060079205
    Abstract: Methods and devices for instructing a subscriber identity module in a cellular communications network to process non-standard authentication information in a standard manner are disclosed. One embodiment of a method comprises receiving a first message authentication code (MAC) and an authentication management field (AMF) at a subscriber identity module as part of an authentication protocol, calculating a second MAC and determining whether the second MAC is equivalent to the first MAC. If the first and second MAC are not equivalent, the SIM calculates a third MAC and determines whether the first MAC is equivalent to the third MAC, and if so, the subscriber identity module processes the AMF in a predefined or standard manner.
    Type: Application
    Filed: September 2, 2005
    Publication date: April 13, 2006
    Inventors: James Semple, Gregory Rose, Michael Paddon, Philip Hawkes
  • Publication number: 20060048235
    Abstract: An authentication system is disclosed. The authentication system includes a content provider configured to distribute encrypted content, wherein the encrypted content is generated using a content key, and a client having a symmetric key and configured to store the encrypted content received from the content provider and issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input, wherein the content provider is further configured to verify the client via the request to ensure that the client has received the encrypted content.
    Type: Application
    Filed: January 6, 2005
    Publication date: March 2, 2006
    Inventors: Gregory Rose, James Semple, Roy Quick, Philip Hawkes
  • Publication number: 20050286522
    Abstract: Embodiments describe a system and/or method for efficient classification of network packets. According to an aspect a method includes describing a packet as a feature vector and mapping the feature vector to a feature space. The method can further include defining a feature prism, classifying the packet relative to the feature prism, and determining if the feature vector matches the feature prism. If the feature vector matches the feature prism the packet is passed to a data recipient, if not, the packet is blocked. Another embodiment is an apparatus that includes an identification component that defines at least one feature of a packet and a classification component that classifies the packet based at least in part upon the at least one defined feature.
    Type: Application
    Filed: June 21, 2005
    Publication date: December 29, 2005
    Inventors: Michael Paddon, Gregory Rose, Philip Hawkes
  • Publication number: 20050100165
    Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
    Type: Application
    Filed: September 16, 2004
    Publication date: May 12, 2005
    Inventors: Gregory Rose, Michael Paddon, Philip Hawkes, James Semple
  • Publication number: 20050102517
    Abstract: Systems and methods of securing wireless communications between a network and a subscriber station are disclosed. One embodiment creates authentication triplets due to expire after a certain amount of time such that they may not be used indefinitely by an attacker who intercepts them.
    Type: Application
    Filed: September 16, 2004
    Publication date: May 12, 2005
    Inventors: Michael Paddon, Gregory Rose, Philip Hawkes, James Semple
  • Publication number: 20040003260
    Abstract: A system and method for digital tickets. An issuer provides a digital ticket to a portable wireless devices such as a sonic token, e.g., acoustic key fob or wireless telephone. The ticket can include a ticket index that may be encrypted. When entry is desired into an entity (such as a movie theater) whose access is controlled by a verifier, a user manipulates the token to wirelessly (e.g., acoustically) transmit the ticket index to the verifier, which grants access if the ticket is valid and has not previously been used or voided.
    Type: Application
    Filed: June 27, 2002
    Publication date: January 1, 2004
    Inventors: Philip Hawkes, Gregory G. Rose
  • Publication number: 20030070092
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
    Type: Application
    Filed: October 9, 2001
    Publication date: April 10, 2003
    Inventors: Philip Hawkes, Nikolai K. N. Leung, Gregory G. Rose
  • Publication number: 20020141591
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
    Type: Application
    Filed: August 20, 2001
    Publication date: October 3, 2002
    Inventors: Philip Hawkes, Gregory G. Rose, Raymond T. Hsu, Ramin Rezaiifar